Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m6jq-g7gq-5w3c

Опубликовано: 03 фев. 2026
Источник: github
Github: Прошло ревью
CVSS4: 5.3

Описание

Qwik SSR XSS via Unsafe Virtual Node Serialization

Summary

Description A Cross-site Scripting (CWE-79) vulnerability in Qwik.js' server-side rendering virtual attribute serialization allows a remote attacker to inject arbitrary web scripts into server-rendered pages via virtual attributes. Successful exploitation permits script execution in a victim's browser in the context of the affected origin. This affects qwik-city before version 1.19.0. This has been patched in qwik-city version 1.19.0.

Impact

This vulnerability impacts applications that dynamically populate Virtual Node attributes with keys/values that users can influence. Applications that hard-code these keys/values are unaffected.

Qwik doesn't use traditional hydration. Instead, it serializes application state into the HTML so the client can resume execution from the server-rendered output. To support this, Qwik v1 marks component boundaries with HTML comments. SSR builds comment content for Virtual components by concatenating structural attribute names and values without any escaping or quoting. An attacker-controlled key or value can prematurely close the HTML comment and inject arbitrary HTML/JS.

Successful exploitation permits script execution in a victim’s browser in the context of the affected origin. Additionally, because Qwik uses these serialized comment markers for resumability, breaking comment structure can lead to resume/hydration desync and unexpected client-side behavior.

Patches

This has been patched in qwik-city version 1.19.0. Users are strongly encouraged to update to the latest available release.

Пакеты

Наименование

@builder.io/qwik-city

npm
Затронутые версииВерсия исправления

< 1.19.0

1.19.0

EPSS

Процентиль: 29%
0.00104
Низкий

5.3 Medium

CVSS4

Дефекты

CWE-79

Связанные уязвимости

nvd
5 дней назад

Qwik is a performance focused javascript framework. Prior to version 1.19.0, a Cross-Site Scripting vulnerability in Qwik.js' server-side rendering virtual attribute serialization allows a remote attacker to inject arbitrary web scripts into server-rendered pages via virtual attributes. Successful exploitation permits script execution in a victim's browser in the context of the affected origin. This issue has been patched in version 1.19.0.

debian
5 дней назад

Qwik is a performance focused javascript framework. Prior to version 1 ...

EPSS

Процентиль: 29%
0.00104
Низкий

5.3 Medium

CVSS4

Дефекты

CWE-79